Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d75c541d0472028e2959890f9f41e270
-
SHA1
354e644965b49fc9fc9c89336f77818420535558
-
SHA256
9a99cfd3b792f08aca555bd4486d6c402a7091640ff851b9000f4e07955e513d
-
SHA512
dec0c5f145fe52a5de1e45781c2d58a16c63d8cd12a084e62f35bbc52cb4e57e9e7c0eb047bcdf600cd401cd814c47d0ebcf1a7aed4d001bbab8a5e8c058c856
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82xi:SbLgddQhfdmMSirYbcMt
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3075) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4632 mssecsvc.exe 368 mssecsvc.exe 4892 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2988 3120 rundll32.exe 83 PID 3120 wrote to memory of 2988 3120 rundll32.exe 83 PID 3120 wrote to memory of 2988 3120 rundll32.exe 83 PID 2988 wrote to memory of 4632 2988 rundll32.exe 84 PID 2988 wrote to memory of 4632 2988 rundll32.exe 84 PID 2988 wrote to memory of 4632 2988 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4632 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4892
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a7bd361b5ada833d31eda6f03a454255
SHA17d08ae9d0dcc2d10ba2f91006f2e724e64c30ae0
SHA256fd12a65fa0e3fb765a22db7c8b538205c99ac16bea247b5f717b36f73ce6813b
SHA51287fd40c2876eaa0f41c26c4a81bf9ad96c5fdea5e1e6a6894765cbae64f6c9742f28d84fecbeb65772531e3c05f57b0d183c254d40a0b084e7670510374b7b04
-
Filesize
3.4MB
MD5eb555f071a3b70e1fdda000076bcb32e
SHA1a2f1fe800e534d64994c0da6b267aad33ceb06b0
SHA25681602293604804dc3364ba1187ac38086739670c7b397b139756e795b1788260
SHA512c225529492035506fd2bb583b16e82b8d04d730efa0de09fafb509b1f751f83c580aefae6028476395950cc8be4fae43b66fe66da3e052eb782e8908ef7f70e7